Most Christmas wish lists have been written and online shopping for presents is well underway. This year, many shoppers will once again pay for their purchases using convenient online banking. Cyber criminals benefit from this development as it enables them to use specific banking Trojans to hunt...

There are good reasons why online shopping has been extremely popular for years: no need to look for parking, no long queues at the checkout and no hectic while looking for presents. Christmas is the busiest time of year for Internet merchants, but not just for them: G Data is expecting cyber...

Natalya Kaspersky, the owner of InfoWatch Holding company, has acquired over 16.8 percent of German antivirus security company G Data Software AG shares. The shares came from different former shareholders, in particular from a venture capital company in Berlin. Natalya Kaspersky is to be elected to...

Natalya Kaspersky, the owner of InfoWatch Holding company, has acquired over 16.8 percent of German antivirus security company G Data Software AG shares. The shares came from different former shareholders, in particular from a venture capital company in Berlin. Natalya Kaspersky is to be elected to...

G Data is now providing smartphone users a free app that protects Android devices against the possible consequences of the USSD vulnerability. The G Data USSD filter intercepts all "tel:" URLs and checks them for corresponding USSD codes, which could be manipulated to delete the smartphone's data...

G Data’s newest Malware Report, which was published today, shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the antivirus industry still needed to develop 1,381,967 new virus signatures to detect and block all new...

Security researchers from G Data Software have identified a botnet that is controlled by attackers from an Internet Relay Chat (IRC) server running as a hidden service inside the Tor anonymity network. Using the Tor network makes it virtually impossible to trace the responsible criminals in control...

A zero-day vulnerability has been discovered in Oracle's latest Java Version 7. This vulnerability enables cyber criminals to access the computers of unsuspecting Internet users in order to attack them. At the moment, only targeted attacks are known, where the malicious code is part of the known...

Smart TVs are televisions with an integrated computer – or put differently: Smart TVs will be, and in many cases already are, the home computers of the 21st century. Users use the web-enabled TVs to surf the Internet, install apps or for video chatting, thanks to the modern devices' integrated video...

Computer malware Dorifel, which encrypts Word and Excel files on infected PCs, is circulating at the moment. The worm first appeared in the Netherlands and is now also spreading in Germany. It is estimated to have infected several thousand computers worldwide. Dorifel was initially smuggled onto PCs...